mirror of
https://git.libssh.org/projects/libssh.git
synced 2026-02-04 12:20:42 +09:00
auth: do not prefer hostbound auth if there is no host key
If there is no host key (e.g., because we are doing gssapi-keyex with "null" host key algorithm), it does not make sense to use host bound authentication. Signed-off-by: Pavol Žáčik <pzacik@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
This commit is contained in:
@@ -548,7 +548,8 @@ static int build_pubkey_auth_request(ssh_session session,
|
||||
int rc;
|
||||
const char *auth_method = "publickey";
|
||||
|
||||
if (session->extensions & SSH_EXT_PUBLICKEY_HOSTBOUND) {
|
||||
if (session->extensions & SSH_EXT_PUBLICKEY_HOSTBOUND &&
|
||||
session->current_crypto->server_pubkey != NULL) {
|
||||
auth_method = "publickey-hostbound-v00@openssh.com";
|
||||
}
|
||||
|
||||
@@ -567,7 +568,8 @@ static int build_pubkey_auth_request(ssh_session session,
|
||||
return SSH_ERROR;
|
||||
}
|
||||
|
||||
if (session->extensions & SSH_EXT_PUBLICKEY_HOSTBOUND) {
|
||||
if (session->extensions & SSH_EXT_PUBLICKEY_HOSTBOUND &&
|
||||
session->current_crypto->server_pubkey != NULL) {
|
||||
rc = add_hostbound_pubkey(session);
|
||||
if (rc < 0) {
|
||||
return SSH_ERROR;
|
||||
|
||||
Reference in New Issue
Block a user